Learn More

Follow Us on Twitter

07/06/2011

When it comes to content security, it is essential to stay ahead of the times by incorporating new features and functions for a more secure email and web gateway. We are glad to announce the release of eSafe Content Security v8.6managed availability from June 28, 2011

New Transparent SSL Mode- Intercepts and scans encrypted SSL/HTTP traffic is now built-in part of the eSafe bridge/router installation mode

Web Quota Control enhancements- New competitive feature allowing monitor and enforce company policy for users/groups that exceeded their daily web quota

Mail IP Reputation features- New Anti-Spam engine that rejects spam email based on the sender IP reputation on connection time. - Rejects and eliminates 80% of spam email before they even establish SMTP connection

New dynamic URL Filtering Engine- 80 URL categories, over 100m URLs categories - More than 90% URL category classification- No more huge local DB, only local dynamic cache with common URLs

11/05/2010

It took almost 40 years from the first computer bug in 1947, to the first PC virus in 1986, which marked the beginning of eCrime. But even then it took more than 10 years for criminals to realize that they can make more money infecting computers than selling drugs. The advent of the Internet and easy reach to millions of computers around the world, created endless opportunities for criminals to make money with almost zero risk. They took things seriously and the sophistication and the professionalism of the eCrime that we see today would have looked as science fiction just 10 years ago.

Threats EvolutionAs the Internet has evolved into the dynamic, collaborative and wide-open Web 2.0, the business of eCrime has evolved along with it. eCrime is now a highly profitable and targeted business model that capitalizes on the weaknesses of an open Web and human’s naïve nature. Carefully crafted and socially engineered spam messages lurk for those naïve and unsuspicious internet users guiding them to infected websites.

The Motive - It’s all about money…The money making process is structured and thorough:

Choosing the tools and methods of operation usually writing code to exploit security vulnerabilities and inject malware into users computer

Operating and feeding the food chain (through money laundering) by selling exploits and malware to operators that control networks of infected computers (BOTNET)

Making money by sending spam and phishing email via infected computers that are part of the controlled BOTNET

The Food Chain

Cybercriminals are paying researchers that sometimes work as a group to scrutinize commonly used internet-enabled applications and find vulnerabilities

They then pay code writers to write malware that exploits found vulnerability

They distribute malware by paying people for each infected computer that joins their BOTNET

All this is fueled by selling spam advertisement for questionable or bootlegged products

This spam is being sent out through the BOTNET of infected computers around the world

Cybercriminals are developing malware that has been purpose-built to find its way around traditional security measures. The race will always be between security solutions and eCrime professionals/amateurs. Security companies are developing new technologies to stop them and Cybercriminals are developing new technologies to bypass security.